Suraj KunwarHow we implemented QR Login in ApplicationAuthentication and authorization play vital roles in any system by managing access and protecting data, ensuring system security. With the…14h ago
Ackermann YuriyTwo years of Passkeys: A reflection pointI have been quiet on writing for the last two years, mostly because I was not sure what to write. The FIDO ecosystem had a complete reboot…Aug 262
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1932Mar 1932
Oguz EvirgenWhat If We Get 401 Response: Handling Access Token Expiration and Refresh in Android using RetrofitHello everyone! Today, we’re diving into an important topic: ensuring a seamless user experience in our app by effectively handling access…1d ago1d ago
Global TechnologyinMcDonald’s Technical BlogThe 100-million migrationA new microservice architecture is improving the user experience of our Global Mobile App, but implementing it meant moving millions of…Jun 112Jun 112
Suraj KunwarHow we implemented QR Login in ApplicationAuthentication and authorization play vital roles in any system by managing access and protecting data, ensuring system security. With the…14h ago
Ackermann YuriyTwo years of Passkeys: A reflection pointI have been quiet on writing for the last two years, mostly because I was not sure what to write. The FIDO ecosystem had a complete reboot…Aug 262
Eric Cabrel TiogoImplement JWT authentication in a Spring Boot 3 applicationThis blog post will show you how to implement a JWT authentication on Spring Boot 3 application using Spring Security 6Mar 1932
Oguz EvirgenWhat If We Get 401 Response: Handling Access Token Expiration and Refresh in Android using RetrofitHello everyone! Today, we’re diving into an important topic: ensuring a seamless user experience in our app by effectively handling access…1d ago
Global TechnologyinMcDonald’s Technical BlogThe 100-million migrationA new microservice architecture is improving the user experience of our Global Mobile App, but implementing it meant moving millions of…Jun 112
Ege AytininPermify Tech BlogJWT vs PASETO: New Era of Token-Based AuthenticationThis article delves into a comprehensive comparison of Paseto and JWT, dissecting their core functionalities, security features, and…Jun 620
Deniz ParlakFastApi Authentication with google oauth 2.0Hi, in this article i’ll try to explain how to make authentication with google, aka “Sign in with Google”.8h ago